Intervenir
con medios hábiles y, a veces, arteros, en la política, en el mercado, en la
información, etc., con distorsión de la verdad o la justicia, y al servicio de
intereses particulares.
http://www.getsafeonline.org/
An intentional event
resulting in modification of a system, its intended behavior, or data.
[CNSSI_4009:2010]
(I) Make an unauthorized
modification in a system that alters the system's functioning in a way that
degrades the security services that the system was intended to provide. (See:
QUADRANT. Compare: secondary definitions under "corruption" and
"misuse".) [RFC4949:2007]
(I) A characteristic of a
system component that provides passive protection against an attack. (See:
tamper.)
Usage: Usually involves
physical means of protection.
[RFC4949:2007]
(I) /threat action/ See:
secondary definitions under "corruption" and "misuse". [RFC4949:2007]
To deliberately alter a
system's logic, data, or control information to cause the system to perform
unauthorized functions or services.
http://www.sans.org/security-resources/glossary-of-terms/
automatic action taken by a
cryptographic module when tamper detection has occurred [ISO-19790:2006]
the automatic action taken
by a cryptographic module when a tamper detection has occurred (the minimum
response action is the zeroization of plaintext keys and CSPs). [FIPS-140-2:2001]